Thursday, October 31, 2019
Multiphase Environmental Flows Essay Example | Topics and Well Written Essays - 6500 words
Multiphase Environmental Flows - Essay Example The other method involves the use of Eulerian/ Lagrangian method in which the particles are treated individually or as a group tracked by the Lagrangian frame of reference. Cundall and Starck developed the discrete element method in 1979 and has been widely used for the study of parcticles in the solid state. Studies conducted using DEM coupled with CFD showed that particles move in plugs along the conveying pipes. According to Kuang et al (2008), one of the most important technologies in the industry is dense phase pneumatic transportation of bulk material in the slug form. In his research paper, Kuang et al (2008) focuses on the numerical study of the slug flow in horizontal pneumatic conveyor by means of discrete particle simulation. Low velocity and dense gas system are common in industries such as mineral processing, agricultural industries and chemical industries. Slug flow is used in the industry to transport materials from one location to another. The slug flow is particularly considered in industries because of its ability to reduce the degradation of plant and also reduce wear. The power utilization of the system is also superior as compared to other flows. The study and simulation of the slug flow therefore brings into light the nature of flow with the aim of understanding the system and improving it. According to the research done by Kuang (2008), the particles used were spherical in shape, made of polythene material with a diameter (dp) of the particle density (pp) was 922 Kgm-3.air was used for the gas phase. The viscosity was taken to be and a density of .The underlying equations for particle flow were the rotational and translation motion determined by the Newton's laws of motion given as; 1 And 2 Where mi is the mass, Ii is the momentum or rotation inertia, is the rotational velocity while is the translational velocity of the particles (Kuang et al, 2008). For the gas phase, the gas flow was considered as a continuous phase and the governing equations are as shown below. 3 4 The coupling method used in Kuang (2008) simulations was both DEM and CFD. At an individual particle scale, modeling of the flow was done using DEM while the gas flow modeling was done using CFD. At each step, DEM gave information of the velocity and position of the particles. The data given by DEM was used by CFD to determine the gas flow field; this then yielded the particle fluid forces acting on individual particles. The resulting forces were then incorporated into DEM to yield the next time phase. The simulation test lasted for 15 seconds, numerical flow during the first 2 seconds was not considered in the analysis as only the macroscopically stable slug flow was considered during the simulation. Property mapping due to the many particles that reside in a given cell was done; the mapping technique was used to aid in the correct calculation of particle fluid force acting on the particle. The least square interpolation was used. Based on this interpolation the particle position wa s given by; 5 Where is the gas properties at the cell center and Is the particle position at the cell center. is The vector denoting the distance from the cell center
Tuesday, October 29, 2019
Doubt by John Patrick Shanley Assignment Example | Topics and Well Written Essays - 500 words
Doubt by John Patrick Shanley - Assignment Example For this reason, she harshly declares that the priests is a pedophile and must leave the school immediately. Her doubt cannot be seen in a positive view as she has picked a very irreconcilable argument yet she has no evidence to show that Father Flynn is guilty. Based on her interaction with people, Sister Aloysius reveals to be a distrustful person especially to men and that is why she thinks that Father Flynn is guilty of pedophile. She is a very strict person who thinks that teachers who are not doubtful are naà ¯ve. When a boy nose-bleeds in class, she concludes that he induced the bleeding to get out of class. She shows how strict and doubtful she is when she makes such utterances as; ââ¬Å"There is a chain of discipline. Make use of it.â⬠(p.8), ââ¬Å"Every easy choice today will have its consequence tomorrow.â⬠(p.9), and ââ¬Å"The best teachers do not perform, they cause the students to perform,â⬠(p.11). When Sister James tells her that Father Flynn has always paid more attention to Donald Miller since he became an altar boy, she is certain that the Father has always had sexual interest in the boy or worse that the boy has already been violated by the priest. Despite all the barriers preventing Sister Aloysius from finding the answers she is seeking, she still pushes the argument of Father Flynn too far as she is torn between her personal emotions and her role as a school principal. She wants to straighten the wrong which she perceives the priest is creating in the school. However, she does take it too far in her pursuit for the truth. When she says: ââ¬Å"In the pursuit of wrongdoing, one steps away from God. Of course, thereââ¬â¢s a price.â⬠I believe she stepped ââ¬Å"away from Godâ⬠by relying on her personal speculation to lie and contradict the same rules she is trying to safeguard. She feels immature and selfish at the end of the parable due to her blind rampage as she declares ââ¬Å"I have doubts! I have such doubts!â⬠(58).
Sunday, October 27, 2019
Gender Differences: American and Chinese Culture
Gender Differences: American and Chinese Culture In the 21st century, a number of significant sociopolitical and technological changes have been witnessed, which have made the world a global village which is getting smaller by the day. The technological feasibility that has enabled the mass media to bring events and news across the world to schools, businesses and homes almost as soon as they occur has narrowed down the distance barriers between people, cultures and societies, such that the world is fast becoming one giant melting pot of cultural, ethnic, religious, linguistic and racial diversities. However, these changes have also resulted in the increase in international tensions between countries world wide, due to the increased interaction. The most significant of these tensions have been witnessed in the past between the United States and Northern Ireland, Eastern Europe and most recently, the Middle East. Thus in light of these developments, the need to develop competent and effective intercultural communication cannot be ov eremphasized. It is indeed a fact that such conflicts are usually of political origin, but are primarily caused by religious and ethnic differences that form barriers to effective communication. The term intercultural communication is sometimes used interchangeably with cross-cultural communication; and it is simply the engagement of concerted efforts at understanding how people who hail form different cultures perceive, act and communicate in their native environment. Intercultural communication plays important roles in fostering understanding in the case of communication between countries in the global platform. (Griffin, 2000). The focus of this paper will therefore be to demonstrate an example of poor intercultural communication between North Americans and Asians and how it affects the effectiveness of communication between the two cultures. Which are long term such as prospecting for oil or minerals; The Process Culture, which is seen in organizations that have little or lack of feedback altogether and the members of the organization maintain a strict focus on the procedures of executing and achieving targets, and is most evident in bureaucracies, with the main advantage of achieving consistency in results which is necessary in sectors like the public service and this fact effectively serves to undermine the massive red tape and overly cautious nature of these cultures. (Deal Kennedy, 1982). Edgar Schein has however come up with a method of classifying organizational culture, which is more in line with the present organizational set up. He defines organizational culture as the patterns of basic assumptions that are shared within a groups and that were learned in the during the solving of the problems of internal integration and external adaptation by the group, and which have produced reliable results that can be considered valid and have consequentially been taught to new embers as the correct way to feel, think and perceive when attempting to solve such problems. It will be important to outline the importance of intercultural communication in an organizational setting, before the importance of the impact of ineffectiveness of intercultural communication between two different cultures can be fully highlighted. Schein (2005) expounds that culture is the toughest attribute of an organization in view of change, and surpasses all other attributes of the organization such as the physical attributes, services and products, leadership, and founders. Schein states that the deepest cognitive level of the culture of an organization is where tacit assumptions exist. He expounds that these are the unseen cultural elements that are not easily identifiable in interactions between members of an organization on a daily basis. These elements of an organizations culture are often regarded as a taboo to question or discuss. (Schein, 2005). Organizational culture has various roles in the process of change in an organization. A number of methodologies have been proposed to elucidate this role, which include Burman Evans(2008) view that culture is more relate d to leadership than management .They elaborate that when an organization has the principle focus of transforming its culture, recognition has to be accorded to the fact that this project is long term. This is because achieving change in the culture of an organization ids a difficult endeavor that requires the allowing of employees to take adequate time to get used to the new strategies within the organization. Thus the stronger the culture of an organization, the more difficult it becomes to achieve the change. The six guidelines to achieving organizational change, as given by CummingsWorley(2005), are (i) The formulation of a strategic and clear vision,( Cummings Worley,2005, pg.490),(ii) display of commitment at top managerial levels( Cumming Worley, 2005, pg. 490),(iii) modeling of the change in culture at the top managerial levels( Cummings Worley, 2005, pg.491), (iv) organizational modification to aid change (Cummings Worley, 2005, pg.491) , (v) selection and socialization of terminate deviants and newcomers (Cummings Worley, 2005, pg.491) and(vi) development of legal and ethical sensitivity( Cummings Worley,2005, pg.491).In regard to the design of a model with methods and procedures for analyzing diversity in an organization, Taylor Cox, Jr. (2001) gives three types of organizations which adopt a particularly focused approach in regard to development of cultural diversity in the workplace environment. She outlines the monolithic, the plural and the multicultural organizations in t he journal, The Multicultural Organization. The three types of organizations, according to Cox, are distinguished by their level of structural integration, which Cox defines as the presence of employees from different cultural groups in one organization, with the monolithic organization having minimal structural integration. Cox goes further to outline that monolithic organizations in the United States are usually represented by a majority of white male employees with few women and yet fewer individuals who hail from minority racial backgrounds in the managerial jobs in an organization. The plural organization, however, has an improved level of structural organization, having a heterogeneous workforce which includes people from different cultural backgrounds, other than just one dominant group from a particular ethnic background. The multicultural organization however displays the highest levels of workplace diversity, because it not only contains an evenly balanced workforce in ter ms of cultural diversity, but it also has an awareness of and utilization of its culturally diverse workforce for the benefits of the organization. Having sufficiently defined workplace diversity, it becomes paramount to outline its advantages to an organization and therefore point out why organizations should strive to achieve a cultural diverse workforce. Thus in order to implement these analytical results in a cultural diversity training program, it is imperative to outline that people have a higher degree of inclination to do business with organizations that employ a staff that they can relate to either socially, culturally or ethnically. Therefore, the ways in which a cultural diversity program can be implemented in organizations includes the methods that can be employed by organizations in ensuring that they end up with a culturally diverse workforce. Some of these methods are therefore outlined below. Recruitment Post-Hiring Job Placement Recruitment is basically networking with organizations to build strong relationships that go beyond just business relationships. For an organization to achieve workplace diversity, it has to have a well established method of recruitment of diverse talent across the area in which it operates, in most cases the native country or the region in general, but not just in a secluded locality. Most companies recruit through universities and colleges. Others opt to attend regional and local jib fairs , for example, the UNITY conference, the National Association for the Advancement of Colored People(NAACP) an the National Association for Multi-ethnicity in Communications( NAMIC). Serious companies that have a high likelihood of employing a diverse workforce have strategic partnerships with these channels for diversity recruitment that aid them in the hiring of staff with diverse backgrounds, styles, skills, etc.( Fine 2000). Research has also revealed that companies which make heavy use of electronic postings for job vacancies have a high likelihood of having a diverse workforce. Thus the seriousness of companies in the utilization of electronic postings to recruit employees can reveal the extent of diversity that the company has in its staff. Very serious companies have Associate Referral Bonus Programs through which they give cash incentives to employees who refer job seekers to the company, and thus have a high chance of having a diverse workforce. Building Partnerships with Organizations the Community Companies have to recognize that to achieve competitiveness in a global economy; they have to forge relationships with other organizations and community members who have the common interest of promoting diversity. With the growth of the nation in terms of social, racial, ethnic and cultural diversity, organizations have to adapt in this environment and acquire an advanced level of understanding of the need to attain diversity in its workforce. Thus companies have to be actively involved in both local and national associations if they are to identify diverse talent pools from which they can benefit. The companies can also create innovative partnerships with institutions of higher learning so that they attract and increase the number of qualified minority employees in their workforce. In this manner, when they are job vacancies the institutions of higher learning are the first to know, and qualified students have a high chance of being employed by the company, with no predetermined cultural, ethnic or social inclination being a dominant factor in the recruitment process, thus effectively increasing the chances of the company ending up with a diverse workforce. Companies also need to organize outreach luncheons where the members of the community can interact directly with the human resources department representatives. In this manner, a broadcast recruitment process can be extended to the immediate community where the company operates, so that any talent that may benefit the company is obtained, and therefore e increasing the diversity of the workforce. The company can also use local business resource groups in order to solicit for the recruitment of a diverse workforce from the local community. (Cox 2001). Mentoring: Internally Externally Companies can form voluntary mentoring programs, which may operate either formally or informally. These mentoring programs can be established both within the company and in the surrounding community. The programs can be used in helping to assimilate new employees into the company culture, as well as to groom the future leaders of the company. In this manner, the chances of the company losing employees from diverse backgrounds due to their inability to fit into the company culture is significantly reduced, thereby fostering the development of a diverse workforce.(Cox 2001). Given the benefits of having a culturally diverse workforce, organizations should strive to attain workplace diversity, and in light of the disadvantages it may create if not properly managed, make it their priority to seek beneficial ways of managing a culturally diverse workforce In regard to diversity in business, the underlying theory outlines that in a global market place environment, a business, company, form or institution that benefits from the services of a diverse work force is in a better position to understand the demographic factors in the market place environment in which the business operates , and is therefore better placed to exploit its full potential in that environment, than a business which has limited diversity in its workforce. A diverse work force generally consists of employees, both male and female, who are of varying racial and ethnic backgrounds, as well as of different generations. (Fine 2000). Workplace diversity has also been stated as having the potential to improve productivity, employee satisfaction and retention at the workplace. In this regard, it is usually referred to as inclusion, and it deals with how an organization can utilize its diversities for its general improvement. (Fine 2000). Research has also established that despite a diverse workforce, the management of the company also needs to make concerted efforts at exploiting that breadth of wealth in terms of experience and knowledge inherent in the diverse workforce in order to convert this wealth in to monetary benefits to the company. Otherwise, a company with a diverse workforce will just fair as well as one which has a less diverse workforce. Therefore, the focus of this paper is to design an informed and well researched model with methods and procedures for analyzing diversity, and to further elaborate on how these results can be implemented in a cultural diversity training program. Workplace diversity can generally be defined as the extent of cultural mix in an organization; Cultural mix/ diversity includes the different ways through which employees in a workplace environment share a unique identity as a group, including the identity associated with the diversity of race, ethnic age , gender and sexual orientation. The culture of an organization is a determinant of it cultural diversity. (Fine 2000). However, workplace diversity in most senses brings many benefits to an organization. However, C.L Walck (1995) states that there are serious problems that arise from an organization inculcating workplace diversity into its culture, and therefore the responsibility of managing workplace diversity as a resource in an organizations workforce in order to fully exploit its potential to improve an organizations overall performance falls on the organizations management. In the Journal of Applied Behavioral Science, C.L. Walck (1995) states that managing workplace diversit y implies the negotiation of interaction among groups which display different cultural backgrounds, and also contriving to foster understanding and cooperation in a culturally diverse environment. In regard to the design of a model with methods and procedures for analyzing diversity in an organization, Taylor Cox, Jr. (2001) gives three types of organizations which adopt a particularly focused approach in regard to development of cultural diversity in the workplace environment. She outlines the monolithic, the plural and the multicultural organizations in the journal, The Multicultural Organization. The three types of organizations, according to Cox, are distinguished by their level of structural integration, which Cox defines as the presence of employees from different cultural groups in one organization, with the monolithic organization having minimal structural integration. Cox goes further to outline that monolithic organizations in the United States are usually represented by a majority of white male employees with few women and yet fewer individuals who hail from minority racial backgrounds in the managerial jobs in an organization. The plural organization, however, has an improved level of structural organization, having a heterogeneous workforce which includes people from different cultural backgrounds, other than just one dominant group from a particular ethnic background. The multicultural organization however displays the highest levels of workplace diversity, because it not only contains an evenly balanced workforce in terms of cultural diversity, but it also has an awareness of and utilization of its culturally diverse workforce for the benefits of the organization. Having sufficiently defined workplace diversity, it becomes paramount to outline its advantages to an organization and therefore point out why organizations should strive to achieve a cultural diverse workforce. An international incident that posed potentially dangerous consequences across the world was witnessed some years back between the United Sates and China; with its primary cause being poor intercultural communication between the two countries. The incident was initiated on the 1st of April, 2001 by the collision of a surveillance plane belonging to the U.S navy with a fighter jet belonging to the Chinese. The collision occurred over the South China Sea, which is considered an international air space. The EP-3 surveillance and electronic warfare U.S. plane was extensively damaged, but due to the skillfulness of there, they managed to safely land the plane at an airbase in China. The Chinese military later declared their fighter jet and its pilot missing, and proceeded to detain the crew members of the U.S. plane; who were 24 in number. The two countries were later unable to reach a consensus on the cause of the collision and resolved to blame each other. In the days that followed, U.S and Chinese officials held a series of contentious negotiations to resolve the incident, with the U.S. officials trying to negotiate the release of the crew, and the Chinese officials demanding an acceptance of liability and a formal apology for the incident from the U.S. The U.S. flatly refused to yield to this demand and blamed the incident on the Chinese pilot. Pressure was meanwhile mounting on the then U.S. President, George Bush to secure the immediate release of the detained U.S crew. In the face of mounting pressure, the then Secretary of State, Colin Powell, issued a statement on April 4 expressing regret over the incident and the subsequent disappearance of the Chinese fighter jet and its pilot. The Chinese officials acknowledged the good faith in which the statement was issued, but simply summed it up as a move in the right direction and issued fresh demands for an apology. On April 8, Colin Powell and the then U.S vice president, Dick Cheney, issued a statement expressing sorrow at the disappearance of the Chinese pilot, but dismissed Chinas demands for an apology. On the same day, they wrote a sympathy letter to the wife of the pilot. Once again, the Chinese rejected these efforts and reiterated their demands for an apology. On April 10, the U.S. officials appeared to have been pushed to the corner and issued a statement declaring that President Bush was willing to write a letter of regret over the incident to the Chinese and an issue an adjoining statement admitting the unpermitted landing of the U.S. plane in Chinese territory. Nevertheless, the Chinese did not burge and still demanded an apology. Eventually, on April 11, the United States wrote a letter to the Chinese Minister of Foreign Affairs specifically asking him to convey to the Chinese people and to the family of pilot Wang Wei that we are very sorry for their loss. The later further stated that We are very sorry the entering of Chinas airspace and the landing did not have verbal clearance. However, the actual word apology was not anywhere to be seen in the letter. But the Chinese official who were charged with communicating the contents of the letter to the Chinese people chose to translate the words very sorry, which appeared twice in the letter, to shenbiao qianyi , A Chinese statement that implies a deep apologetic expression and is only used when one is accepting liability for wrong doing and its consequences. Based solely on the translation of this letter, the Chinese released the U.S. crew. One thing that clearly emerged from this incident is that it was a matter of what the U.S. chose to say and what the Chinese chose to hear that ended this impasse. This matter was resolved by the exploitation of the loss of meaning inherent in translation from one language to another by the United States officials who were involved in the negotiations. Bates Gill, the North East Asian Policy Studies director at Brookings Institution states that U.S.negotiators have in the past exploited the use of such words as acknowledge which upon translation stand for to recognize or admit, so that the Chinese can take such words to mean an admission of guilt, when this is not really the case. (Griffin, 2000). There are several cultural differences between the Chinese an Americans, which has necessitate the need to develop a meaningful intercultural communication network so as to foster understanding between these two countries with the ultimate aim of creating a better relationship between the two countries. The benefits of an effective intercultural communication network include, but are not limited to creation of healthier communities, reduced friction and conflict, improved international, regional and local commerce and increased tolerance which results into personal growth. (Griffin, 2000). The cultural differences between the two countries that necessitates the employment of effective intercultural communication networks. Some differences particularly in the societal and institutional organization of American and Chinese societies that significantly played a role in the development of the highlighted incident to the stated proportions include; ethnic culture, whereby the Chinese are generally a reclusive people, preferring to mind their own business and center their cultural values in building of healthy relationships with each other at individual level. They keep to themselves and isolate strangers, while Americans are individualistic and do not believe in strong cultural ties and generally operate under an attitude of saving the world and thus meddle in all affairs unfolding around them. In terms of source of trust, the Chinese believe in trusting the people who surround them and dread losing credibility as a result of failure to live up to oral agreements. The Ameri cans on the other hand, belie in trusting the terms of the contractual agreement and not the people they deal with. Their only fear is getting into legal hassles as a result of contravening the contract, and show little respect for oral agreements. (Griffin, 2000). In terms of business culture, the Chinese are genially clumsy in their communication and operate with quietness and reservation when doing business. The Americans are the exact opposite; being effective and eloquent communicators who are in most senses very outspoken. In regard to the style of negotiation, the Chinese make group decisions, but the final decision lies with the boss. Americans believe in the giving of more individual authority to the stake holders, with the decision making process evenly distributed among the major players. When it comes to dealing with business counterparts, the Chinese are courteous and deal with their clients at a personal level, such that if there is a breach of contract then arising issues are taken up strongly, with the bad experiences being committed to long term memory. Americans, on the other hand, keep it strictly business, and adopt a matter-of-factly approach. They are also always willing to negotiate with the enemy so long as there is something to gain. (Griffin,2000).Finally, the Chinese exhibit a serious weakness in the ability to make quick decisions in the heat of the moment, while their American counterparts have a strong sense of resolving serious issues as they present themselves. (Griffin, 2000). Being that the negotiations for the release of the detained U.S. crew was taking place between officials representing two countries, it was very necessary that careful and appropriate diplomatic approaches be employed, lest the situation get out of hand. Therefore the choice to use letters to communicate official positions presented an appropriate communications device. Letters, as communication devices, are effective in that in they leave no room for ambiguity and contention. They are also formal and can be easily stored and retrieved fro reference in case a clarification is required. An appropriate communication theory that was at play in these negotiations was the stand point theory which outlines that knowledge, communication behaviors and individual experiences are largely under the influence of the social groups to which they belong. (Gudykunst, 2003).This is because by carefully exploiting the loss in meaning due to translation of words from one social setting to another, the United States officials who negotiated the release of the U.S. crew managed to establish a delicate balance between yielding into the demands of the Chinese, and maintaining the sovereignty of the United States through avoiding being arm-twisted into issuing a public apology to China. Had this issue not been resolved amicably, the situation could have rapidly degenerated to unimaginable proportions. This is an example of how effective intercultural communication can play important roles in achievement and maintenance of good diplomatic relations in the face of a potential crisis. References. Burman, R. Evans, A.J. (2008) Target Zero: A Culture of safety, Defence Aviation Safety Centre Journal, 34 (2), 22-27. Retrieved, 10 March, 2010, fromhttp://www.mod.uk/NR/rdonlyres/849892B2D6D24DFDB5BD9A4F288A9B18/0/DASCJournal2008.pdf Charles, W.L. Gareth, R.J.(2001). Strategic Management. New York: Houghton Mifflin. Cox, Jr., Taylor (2001). The Multicultural Organization. Academy of Management Executive, 5(2), 34-47. Cummings, Thomas G. Worley, Christopher G. (2005), Organization Development and Change. New York: Thomson South-Western. Deal T. E. and Kennedy, A. A. (1982) Corporate Cultures: The Rites and Rituals of Corporate Life. Massachusetts: Penguin Books. Huczynski, A. and Buchanan, D.A. (2007). Organizational Behaviour: an Introductory Text. Michigan: Prentice Hall. Montana, P., and Charnov, B. (2008). Management. New York: Hauppauge. Schein, E.H. (2005). Organizational Culture and Leadership. New Jersey: Jossey-Bass. Fine, Marlene G.(2000). Cultural Diversity in the Workplace: The State of the Field. Journal of Business Communication, 33(4), 485-502. Griffin, E. (2000). A First Look at Communication Theory. Boston, MA: McGraw-Hill. Gudykunst, William B. (2003), Intercultural Communication Theories, in: Gudykunst, William B (ed.), Cross-Cultural and Intercultural Communication, 1(3), 167-189. Huczynski, A. and Buchanan, D.A. (2007). Organizational Behaviour: an Introductory Text. Michigan: Prentice Hall. Montana, P., and Charnov, B. (2008). Management. New York: Hauppauge. Walck, C.L. (1995). Editors introduction: Diverse approaches to managing diversity. Journal of Applied Behavioral Science, 3(1), 119-123. The Movie: The Devils Advocate The Movie: The Devils Advocate I had a chance to watch the movie The Devils Advocate that was directed by Taylor Hackford and released in 1997. This movie is one of the best films that have some deep theology over the doctrine of God and the philosophical problem of evil. In fact, the problem of evil has been discussed over the long centuries, and the debate still rages on today. After watching the show I really got thinking whether I am on a right way in my life and reconsider my life priorities. Basically, the film is about the law company run by John Milton who represents the Satan. I believe that the author chooses the lawyers as the main characters intentionally because they have this power to judge the others and decide on the lives of the accused. The show reveals different kinds of issues that all humans from different parts of the world struggle. Also, the movie proves how sin leads to falling and destroys the human life. The most interesting thing is that in the show it is presented as the Satans plan. However, there are certain moments where it is obvious that the humans have a choice and go for sinful one. What is so dangerous about the humans? Why are we always destroying ourselves and the world around us? The answer cannot be simple explained by the original sin and human weakness. Actually, the reason is the loss of ethics and concerns for the others. People obsessed with vanity, greed, lust and the list can be continued. The reason is that they merely violate the Ten Commandments written in the Old Testament, or put it differently, Gods law. The illustration of vanity is an episode when John Milton asks whether it would not be better to take care of wife and give up one case. Kevin Lomax responds that You know what scares me? I quit the case, she gets better and I hate her for it. I dont want to resent her, John, Ive got a winner here. Ive got to nail this fucker down, do it fast, and put it behind me. Just get it done. Then put all my energy into her ( The Devils Advocate (1997) Memorable quotes, n.d.). It is worth to admit that this choice is the significant moment that led to the ruin of Kevins family and life. Therefore, this passage highlights basic, fundamental beliefs at play. This is a great example of how fast the humans get possessed with power and exchange biblical moral beliefs to follow fleeting sinful desires. It seems that with each step we take away from these beliefs, we each step become closer to true evil. The strongest point in the show is presented by Kevin Lomax who asks, Better to reign in Hell than serve in Heaven, is that it?( The Devils Advocate (1997) Memorable quotes, n.d.). Then, John Milton responds, Why not? Im here on the ground with my nose in it since the whole thing began. Ive nurtured every sensation mans been inspired to have. I cared about what he wanted and I never judged him. Why? Because I never rejected him. In spite of all his imperfections, Im a fan of man! Im a humanist. Maybe the last humanist. (The Devils Advocate (1997) Memorable quotes., n.d.). This approaches to the doctrine of God. I mean that God has integrity; he is truthful. God is concerned for the welfare of those whom He loves for their best interest. God has unconditional love and unselfish interest in us for our sake. As in the Bible John 3:16, For God so loved the world that he gave his one and only Son, that whoever believes in him shall not perish but have eternal life. In contrast, Satan always hated the humans from the existence. The problem of evil challenges Christian faith, but we should not forget that the Lord promises us the blessing in our life, and all we need just obey and be faithful to God. Even though all people are sinners as we are born with it, God is generous to us because in his plan he gives us a chance for redemption and salvation. I remember from the class lectures that, according to Augustinian theodicy, there is no evil but the lack of good. God created us as good beings in His image. However, we have a free will, and we have to make the choices that will define our life, our surrounding, our ethics, our relationships, and our faith. When the humans put themselves over the Creator, we separate from God even if He loves us. I see that in the choice that God gives us we have to take responsibility for our actions. As a matter of fact, this responsibility is repentance. What worldview is assumed in the show? The show The Devils Advocate paints a clear picture of different worldviews with its consequences. Some have faith in the government or in a hope for world peace. Others have faith in their money, their education or their employment; however, it can all let them down. Our health can fail, we can lose our job, and we can end a meaningful relationship with someone we care about. In contrast, I am convinced that all of those things are temporal, and they can be changed. I am a believer, and I agree that only Christian worldview produces a way of living that is fruitful and creative. There is no doubt that the Christian faith makes sense in this world that has lost its moral. I believe that the truth is absolute, and it can only be understood by submitting to the Lordship of Jesus Christ. We all live by faith. To sum up, I have to say that I really enjoyed the movie because it made me to think what is really destroying our world, and what our part in creating better future is. We should start from the choices we make every day. Gods will do not have power unless we allow evil to seep in our hearts.
Friday, October 25, 2019
Internet Music Sharing and the RIAA Essay -- Internet Online Communica
Internet Music Sharing and the RIAA In todayââ¬â¢s high-tech computer savvy world, one of the largest controversies brewing on the internet is the downloading and sharing of music using various peer-to-peer programs such as Kazaa, Limewire, Audio Galaxy, and many others. These programs use software that, ââ¬Å"rather than going through a server to request information, can make requests directly to other software. This attribute is what allows users of P2P networks to freely exchange music, movies and other types of files (Friedenberg).â⬠To the everyday user, downloading all of their music from the internet is great. Who wouldnââ¬â¢t want to be able to get the newest Radiohead CD months before it comes out in stores and for free? However, the Recording Industry Association of America (RIAA) doesnââ¬â¢t find sharing music over the internet to be quite as appealing; in fact, according to the RIAAââ¬â¢s official website, they have begun launching their first of what could potentially be thousandââ¬â¢s of civil lawsuits against users of these peer-to-peer programs. (Recording Industry Begins Suing P2P File Sharers Who Illegally Offer Copyrighted Music Online). On Monday, September 10th, the RIAA sued 261 people, one of whom was a 12-year-old girl, Brianna LaHara of New York. This lawsuit was settled for $2,000 on Tuesday, by her mother (Music Piracy Suits Could Bring Backlash ) and was actually paid by P2P United, which is a group who represents major file-sharing websites on the internet (Mello). Mo st likely to appear to the people that are on the edge between the goods and evils of file sharing as the good guy, for helping out a 12-year-old who many believe shouldnââ¬â¢t have been prosicuted. Many people were upset by this particu... ... September 2003. . Mello, John P. ââ¬Å"RIAA Settles First Lawsuit Against 12-Year-Old Brianna LaHara.â⬠Tech News World. 11 September 2003. Tech News World. 23 September 2003. . ââ¬Å"Music Piracy Suits Could Bring Backlash.â⬠CNN.com. 10 September 2003. CNN. 21 September 2003. < http://www.cnn.com/2003/TECH/internet/09/10/backlash.music.ap/index.html>. Recording Industry Association of America ââ¬â About Us. Recording Industry Association of America. 21 September 2003. . ââ¬Å"Recording Industry Begins Suing P2P File Sharers Who Illegally Offer Copyrighted Music Online.â⬠8 September 2003. Recording Industry Association of America. 21 September 2003 .
Thursday, October 24, 2019
Marketing Debate
Is Consumer Behavior More a Function of a Personââ¬â¢s Age or Generation? MKT 6661 Strategic Marketing Management Troy University Introduction A heavily debated issue between marketers is what drives consumer behavior? There are two noted positions in this debate, one that believes that age differences are the deciding factors of a consumerââ¬â¢s wants and needs and others make the case that cohort and generation effects are better suited to uncover the consumerââ¬â¢s desires. Marketers have a major responsibility to identify and reach out to the marketplace and find out what influences an individualââ¬â¢s purchasing decisions.Rather these decisions can be sorted based on a group of individuals shared experiences or by simply bunching these individuals into their respective generations but a system has to be in place to provide insight to what is the best way to channel into the consumerââ¬â¢s buying methods. So whatââ¬â¢s all the Fuss About? The question that we ar e trying to answer is, is consumer behavior more a function of a personââ¬â¢s age or generation? There has been inclusive research on the driving forces of what drives consumer choice.A pattern has been discovered that people who make similar purchases may also share other specific social-economical similarities. This gives way that there is some background to be learned about these purchasing groups. Cohorts, or Aged-Based Marketing, tend to share a significant number of experiences, goals, and values. (Bidwell 2009) The main principle behind a cohort is that individuals make purchasing decisions based on events that they experienced through their lives, such as their childhood, adolescents, early adulthood and so forth.These events, called defining moments, influence attitudes, preferences, values, and buying behaviors, and these attitudes, values, and buying-behavior motivations for each cohort remain virtually the same throughout their lives. (Bidwell 2009) In contrast to coh orts, on the other side of the debate, the method of evaluating consumer behavior by placing consumers in a group of individuals born and living about the same time. This is the practice of multi-generation marketing. Each generation has unique expectations, experiences, lifestyles, values, and demographics that influence their buying behaviors.Multi-Generational marketing has a broader platform in which individual consumers are placed. Some specifics of these two marketing segments can draw some contrast between the two. To use the cohort model most effective there must be a combination of peopleââ¬â¢s ages and information about their particular life stages. Some examples of different life stages are empty nesters, retirees, young families, and your careerist. (Bidwell 2009) Most consumersââ¬â¢ life stages are fairly predictable so it provides for their purchasing habits to be predictable.There can be contrast amongst different cohorts as well, depending on the unique events that an individual shared with others in the same cohort. According to Charles D. Schewe, a professor of marketing at the University of Massachusetts at Amherst and consultant to numerous companies, there are seven American cohorts. The first cohort being the Great Depression cohort, born between the years of 1912 and 1921 and represent approximately seven percent of the U. S. population, secondly is the World War II cohort born between the years of 1922-1927 and represent about five percent of the U.S. population, the third cohort is known as the post WWII cohort, this group was born between the years of 1928-1945 and represent about twenty three percent of the U. S. population, next are the Baby Boomers I and Baby Boomers II cohorts, they represent together about forty three percent of the U. S. population and were born between the years of 1946 to 1964, the sixth cohort are the Generation Xââ¬â¢ers who were born between the years of 1966 and 1976 and make up approximately twen ty two percent of the U. S. opulation, and lastly there are the N-Gens, born from 1977-1987, and make up twelve percent of the U. S. adult population. ( Bidwell 2009) Though these cohorts span over a number of years they are all linked by a series of events that follow a chronological order. Even though a cohort places consumers in segments based on lifestyles but the time in which these events occurred can have drastic effect on their purchasing choices. Looking at the metrics of generational marketing on surface can resemble age-based marketing very closely.This is not an intentional consequence to be vague in practice or by definition but help narrow the message down that the marketer is trying to relay. Take a look this table that depicts the six U. S. Generations. Generation| Date of Birth| Number| Age (in 2010)| Pre-Depression| Before 1930| 12 MM| 81 and above| Depression| 1930-1945| 28 MM| 65-80| Baby Boom| 1946-1964| 80 MM| 46-64| Generation X| 1965-1976| 45 MM| 34-45| Gener ation Y| 1977-1994| 71 MM| 16-33| Generation Z| After 1994| 29 MM| Less than 16| (Marketing to the Generations 2010)Looking at the table, generation analysis and Cohort effects follow a very similar chronological order and demographics but generation analysis is a much broader form of marketing intelligence. At best we have put a group of consumers at the same place at the same time using this method. By knowing the generation the consumer was born it does help the marketer pin point the most effective way to communicate with the consumer taking a macro overlook of the consumer. Based on what generation a consumer was born in gives insight of how techno savvy or financially conservative, education level the consumer received.Conclusion As I really think about the original question and look for the answer it seems to me that these two methods work in tandem with each other. The bigger picture is understanding the holistic approach to getting your message across the consumer. Cohort i s a much more defined process, in that it outlays the needs of the consumer at different times in their lives but knowing the generation that the consumer helps to point the marketer in the right direction when extrapolating data from individual.Undoubtedly to me both are instrumental in a effective and efficient marketing information system References Bidwell. 25 March 2009 Cohorts: Age-Based Marketing. http://www. bidwellid. com/resources/white_papers/Bidwell_ID_Cohorts. pdf Williams, K; Page,R 2010 Marketing to the Generations http://www. aabri. com/manuscripts/10575. pdf Kotler, P. , & Keller, K. (2012). In K. Keller, & P. Kotler 14th ed, Marketing Management
Wednesday, October 23, 2019
Pros and Cons of Prison Privatization Essay
Prisons are institutions that have specifically been designed to handle the members of the society who are under conviction of different crimes. The people who reside in the prisons are referred to as inmates or prisoners and the time they spend in the prisons depends on the imprisonment period. This period is dependent of the intensity of the crime committed. Once in the prisons, the inmates undergo rehabilitation, incapacitation, retribution and deterrence which are elements for considered appropriate for the provision of justice to the society. In the past, it has been the responsibility of the government to manage these institutions on behalf of the society. The increased debate on the privatization of different institutions has seen a debate being launched in regard to the privatization of prisons. This implies that the main purposes of these institutions to the society are shifting from not just maintenance of justice but also as a source of financial wealth. The new advancement is directed at allowing the straightening out of the contemporary faults that exist within the public prisons such as recidivism and overcrowding but there are some people who are opposed to this due to some possible negative results. In short, the process of privatizing the prison industry has both negative and positive effects and this paper seeks to address some of the pros and cons of this exercise. Privatization though a new concept to be applied in prison department in most of the countries across the globe, there are a few countries who used it in the past. For example during the mid 18th century, the United States government entered into a treaty with a number of private investors to manage a number of its institutions and these investors went ahead to contract inmates to some of their private enterprises as a source of labor. Some of the institutions that were contracted included ââ¬ËNew York Auburn and Louisianaââ¬â¢ penal colonies. However, this did not last for long based on the fact that there was rampant corruption that was carried out as well as vicious resistance from other businesses who termed this as some kind of ââ¬Ëunfairââ¬â¢ competition that was caused by these workers who were unpaid. Contemporary private prisons are however not the same as these because they operate on new models that are more promising. The Pros on the Prison Privatization Industry One of the major benefit that privatization of prisons would bring about is cost saving. The cost of crime depends upon relative increase in the rate of crime. The government in different countries spends billions of dollars every year on construction of prisons so as to be able to handle the increasing rates of crime. This is not the only cost based on the fact that guards to guard these inmates need to be recruited as well as other expenses that include; administration, food, health and education costs. It is argued by the majority of proponents of this idea that private companies can operate the prisons at a cost that is far much low than what the government uses and still maintain the quality services that are required. Some of the major reasons that these proponents give in regard the reduced cost are the elimination of bureaucracy, red tape, and the numerous laws that usually makes the costs of managing the prisons to rise in the case of public prisons. Allowing the private sector to manage these institutions will imply that some of the costs that are involved in learning the jail will not be generated from the tax payerââ¬â¢s contribution directly and as a result the money may be diverted to other government projects. This will facilitate better utilization of the governmentââ¬â¢s funds to develop the areas that are in serious need of development. Due to the issue of competition privatization there will be increased productivity as well as reduced waste in terms of resources. Studies have revealed that the boarding cost in the private owned prison to reduce to half that of the government owned prisons. There have been other studies some institutions saved more than twenty percent of the cost incurred in terms of the construction expenses and management costs reducing by 5-15% Sloane, 1996). The cutting down on cost is something that has been criticized heavily by the lobby groups who think that this will lead to the deteriora tion of the conditions inside these prisons. This is an economical plan that aims at giving back to the society as it serves to preserve justice to the community. According to the economic theory, the problem of financial support towards the running of the prison facilities would go down if there are more available, renting and selling prison cells, the challenges in terms of the funding and efficient allocation of prison space. Privatization of prisons is based on this factor of trying to exploit the opportunities by the introduction of factories adjacent to bars, cost reduction of the costs and give the prisoners the freedom to earn some pay as they give back to the society through the provision of labor. By this, they will be making peace with the society that they infringed some pain in the initial time through committing of crime. Though the public prisons try as much to carry out this exercise, this cannot be compared to the private sector that expresses this in a more profound manner. One way of demonstrating this is what was demonstrated in the United States sometimes ago. There was a time when there were more than one hundred private firms that with more than two thousand prisoners in the manufacturing industry. These inmates used to manufacture goods with the range of bird feeders, circuit boards, and other related equipments and from the money that was earned through this method, about 56% of it was used to cater for the room and boarding facilities, restitution of the victim, and support of the family. The process also left the inmates with some acquired skills that they could use during their re-integration process that welcomed them back to the society. Having some skills that they could use to earn a living put them in a better position in the society based on the fact that these people were liable of being treated by the community as ex-convicts that may rerun back into crime. It is also worth noting that the process of privatization may lead to some other new methods of criminal control other than the use of jail to detain people there by denying them freedom. One method can involve methods of detaining criminals within their dwelling by the use of new technology such as surveillance through small devices worn on the body such as bracelets or the electronic monitoring. It is however worth to note that such methods would cause some greater concern of the general public based on the fact that some would question whether the method would be effective in ensuring that crime is contained in the society. In short the privatization of the prison industry would have a lot of benefits as mentioned in the points that have been stated above. The financial benefits, well being of the prisoner, security gains, and answerability among other factors might be used by the proposers of this system to ensure that the majority of the prisons are privatized so as to improve this important institution that ensures the execution of justice in a given country. The concept of privatization is indeed a very bright idea that has so many advantages though the issue needs to be put under more scrutiny to be able to get to the bottom of some of the positive features that have been mentioned in this paper. This is a concept that has the potential of flourishing if given the attention it deserves to ensure that the social interests come before the urge to maximize profits by the corporations that have been contracted to set up the private institutions. It is also worth noting that each of the positive points that have been presented in favor of privatization, an equal amount of disproof as a means of counteract or frustrate this should be expected as it is the case for the public prisons. This is because in each debate regarding an issue that will touch on the welfare of the society there are those who are behind its implementation and there are those who solidly oppose such an issue; this is a good example of this kind of a topic. The Cons on the Prison Privatization Industry It is obvious that the main motive behind privatization is the profit. This is one of the major issues that can lead to a conflict of interest. It should be noted that prisons not only serve to separate the criminal from the rest of the society and give them punishment, it is also the duty and responsibility of the people in charge of the prisons to ensure that the criminals go through a rehabilitation process to ensure that that the recidivism rate is highly reduced based on the fact that it is very risky to relapse to the earlier behavior. Though the private prisons are cheaper than the public, they are not as efficient based on the fact that obtaining profits through the management of a prison would mean that rehabilitation programs, medical care, food and the hiring costs will be reduced at the expense of the welfare of the inmates. As a result, there high chances that the inmates will be underfed, experience poor living conditions, lack the rehabilitation guidance and be supervised by inexperienced and unskillful officers. James Austin who was an analyst conducted a survey in regard to the welfare of the inmates in some of these prisons and the results he obtained spoke volume of the kind of experiences that the inmates had to cope up with. One of the discoveries he made was that there was 49% more assaults on inmates by staff and 65% more assaults by inmates in the private run facilities than in the facilities that were learn by the government. This is one of factor that indicates that these private prisons are not that efficient when it comes to their performance. Another report that was conducted in England indicated that that the privatized prisons had bad scores in terms of the security and management based on the fact that there was failure in containing drugs, severe assaults and intentional criminal act ivity in the prisons. In addition, there are poor payments as well as working conditions in the private prisons as compared to the public prisons and this is the reason why there is high turnover in the public prisons as compared to the private prisons. It is also worth noting that privatization brings about lack of transparency in the prisons department. Public prisons have high degrees of transparency as compared to the private prisons. Despite having low transparency, the private prisons are also hard to legalize, scrutinize and bleaching of the contractual agreements are common and hard to detect and resolve. In short, the public prisons can be scrutinized easily by the public unlike the private prisons where public scrutiny cannot be assured due to the operation contracts that are usually confidential causing a serious failure in terms of accountability. Finally, this issue that seems to contradict the traditions that have been used for a long time by different countries in regard to the state respon sibility. There are functions that have been known for a long time to belong to the government and not to private developers since they are considered to belong to the class of the state responsibility to its citizens and one of this is the national defense. This is one thing that goes hand in hand with the protection of the public against crime and one of the major methods of doing this is the prison department and as a result, this department should be managed by the government of the particular country. Furthermore the act of administering punishment needs to be delivered by a body with high authority for it to be effective and this can only be the government towards is citizens who have indulged into criminal activities. As a result the ruthlessness of the punishment impacted by imprisonment or the denial of freedom needs to be executed by the government which is the sole representative of the society and not some individuals from the private sector. Privatization has also received some critics in regard the issue of ââ¬Ëlow-ballingââ¬â¢. This is a system or a trick that played by contractors on the government. They under bid their fellow competitors with the aim of winning the tender and once they have won the tender, the costs are increased to very outrageous figures. The worst thing is that the competitors stand a chance of learning into bankruptcy, a situation that can leave the government in a positional that does not have any correctional capability. If this is introduced in the prison sector, this would mean that such an important section of the ensuring justice in the country would have some technical hitches and provision of poor facilities, a thing that would make this body loose its purpose. Despite the system having some advantages, there are a good number of disadvantages that may hinder the process of privatization in a given country. Some of the arguments presented by a section of scholars may not hold water but there are some arguments against privatization that should really be put into consideration for the sake of the welfare of the citizens who should be the first priority of any government (Sloane, 1996). Morality is a very important virtue and based on the fact that there are some aspects of privatization that undermine this value, it is a matter that needs to be deliberated deeply. It is also questionable as to whether the issue of morality and the society peer responsibility as well as the ultimate should be left to the hands of people whose major motive is to maximize profits and search of financial gains. This is an issue that makes the society to appear as if it is no longer guided by morals but rather by greed for money and opportunistic advocacy.
Tuesday, October 22, 2019
Question Papers Essays
Question Papers Essays Question Papers Essay Question Papers Essay Model Question Paper Subject Code: BC 0058 Subject Name: Data Warehouse Credits: 4 Marks: 140 Part A (One mark questions) 1. When a large number of transactions are taken and stored to be dealt with at a later time without the presence of a user, the process is known as â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦.. a. OLTP system b. batch processing. c. Data warehousing d. None of the above. 2. OLTP stands for a. Online Transaction Processing b. Offline Transaction Processing c. Online Transfer Process d. Offline Transfer Process 3. Who is the Father of Data Warehouse? a. Michael Reed b. Bill Inmon c. Ralph Kimball d. Dr. Rakesh Agarwal. 4. Which is not a type of data warehouse. a. Federated Data warehouse b. Distributed Data warehouse c. Real time Data warehouse d. Subject oriented Data warehouse 5. Which is not a Key Issue during data warehouse construction. a. Values and expectations. b. Risk assessment. c. a b both d. None of the above 6. The _____approach is to start by building individual data marts one by one. a. Top down b. Bottom up c. best-of-breed d. None of the above 7. _________ is known worldwide as an innovator, writer, educator, speaker and consultant in the field of Data Warehousing. a. Michael Reed b. Bill Inmon c. Ralph Kimball d. Dr. Rakesh Agarwal 8. With the ___________ approach, compatibility among the tools from different vendors could become a serious problem a. Top down b. Bottom up c. best-of-breed d. None of the above 9. The structure that brings all the components of a Data Warehouse together is known as theâ⬠¦Ã¢â¬ ¦. a. Organization b. Architecture c. System d. structure 10. Which data is supported by different database systems and operating systems and is the data from many vertical applications. a. Production Data b. Internal Data c. External Data d. Archived Data 11. Which applications are knowledge discovery systems where the algorithms help you discover trends and patterns from the usage of your data. a. Ad hoc b. MD analysis c. Data-mining d. EIS Feed 12. A __________ is a repository of data gathered from operational data and other sources that is designed to serve a particular community of knowledge workers . a. Data-Mining b. Data Mart c. Metadata d. Data warehouse 13. Which Data Model describes data from a high level. a. Logical b. Physical c. External d. Conceptual 14. Which technique is a discipline used to illuminate the microscopic relationships among data elements. . Dimensional Modeling b. Star schema c. E-R modeling d. Data warehousing 15. The main purpose of ER modeling is a. To improve analysis for decision making b. To remove redundancy c. To record historical data d. All the above 16. Dimension modeling is represented using a. Snow-flake schema b. Star schema c. Fact constellation d. Granularity schema 17. Data extraction, transf ormation, and loading encompass the areas of data acquisition and ______ a. Data loss b. Data regain c. data storage. d. Data transfer 18. ________ presupposes a selection process and select the needed data based on the user requirements. . Data extraction b. Data transformation c. Data loading d. data storage 19. _______ implies physical movement of the data from the computer storing the source database to that which will store the data warehouse database, assuming it is different. a. Extraction b. Transformation c. Loading d. Storing 20. Which of the following is not the type of data loading a. Initial Load b. Incremental Load c. Full Refresh d. decremental load 21. The state of completeness, validity, consistency, timeliness and accuracy makes data appropriate for a specific use. a. Data warehouse b. Data mining c. Data quality d. Data mart 22. ____refers to the methods of automatically identifying objects, collecting data about them and entering data into the data warehouse a. Data capture b. Data Integration c. Data Profiling d. Data Cleansing 23. Which is not a popular OLAP tool a. Business Objects b. Cognos c. SAS/OLAP Studio d. None of the above 24. Data stored by operational systems, such as point-of-sales, are in types of databases called ____ a. ERP b. Supply chain management c. Online Transaction Processing. d. Customer relationship management 25. A data model consists of a. Structural part b. Manipulative part c. Set of integrity rules d. All the above 26. ______is a process of modeling and formalizing data requirements is an intrinsic part of the database design process. a. Data modeling b. Data extraction c. Data integration d. Data distribution 27. RAID stands for a. Redundant Array of Inexpensive Disks b. Redundant Application of Integrated Data c. Reduced Application of Inexpensive Data d. Reduced Application of Integrated Disks 28. According to Ralph Kimball, Back-room metadata guides: 1. Extraction 2. Cleaning 3. Loading processes a. 1,2 only b. ,2 only c. 1,2,3 all d. 2,3 only 29. Which is not an example of Technical Metadata. a. hardware details b. software details c. Query response time details d. system configuration details 30. In ETL process all the records in the _________ that should be brought into the data warehouse actually are extracted into the data warehouse. a. Destination system b. source system c. Data system d. user system 31. _ ____ Testing ensure that the ETL Process functions well with other upstream and downstream processes. a. Unit b. Regression c. Performance d. Integration 32. UAT stands for a. Unit Acceptance Technique b. User Acceptance Testing c. Unique Acceptance Testing d. Union Acceptance Technique 33. ______ is a technique of extracting the hidden predictive information from large databases. a. Data Mining b. Data warehousing c. Data extraction d. Data transformation 34. Which of the following is not a technique of data mining: a. Artificial Neural Networks b. Decision Trees c. Genetic Algorithms d. chinese postman problem algorithm 35. CART stands for a. Chisquare Automatic and Regression Testing b. Classification and Regression Trees c. Credit-card Automatic Route Transfer d. Chisquare Algorithm Regression Testing 36. ______ provides tools for searching, sorting, filtering and drilling down enabling previously complex data models to be viewed intuitively through real-time 3-D graphical representation a. Intelligent Miner b. Enterprise Miner c. MineSet d. Clementine 37. Which of the following is not a tool of data mining a. MineSet b. Intelligent Miner c. Weka3 d. Redbrick 38. A ______ Web house is a single most important tool for identifying, prioritizing, and retaining e-commerce customers. a. click stream b. Data stream c. Design stream d. rag stream 39. When you bring your data warehouse to the web, from the point of view of the users,then which of the following is not the key requirement for the same: a. self-service data access b. interactive analysis c. low availability and performance d. zero-administration client 40. _______which provides low-cost transmission of information, and exchange information with anyone within or outside the company. a. I ntranet b. Extranet c. Internet d. user net Part B (Two mark questions) 41. State whether the following statement is true or false for Data warehouse and OLTP 1. A Data Warehouse (DW), is a database that is designed for facilitating querying and analysis. 2. OLAP system is designed to be read-optimized. a. 1-T , 2-F b. 1-F , 2-T c. 1-F , 2-F d. 1-T , 2-T 42. A Data Warehouse is a relational database that is designed for â⬠¦Ã¢â¬ ¦ and â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦. a. Process and transaction b. Query and analysis c. Searching and selection d. Searching and sorting 43. State whether the following statement is true or false for the differences between OLTP and Data Warehouse projects. 1. The Data Warehouse record transactions in real time and aims to automate the clerical data entry processes of a business entity. 2. The OLTP database does not cater to real time operational requirements of the enterprise. a. 1-T , 2-F b. 1-F , 2-T c. 1-F , 2-F d. 1-T , 2-T 44. What are the vital areas in data warehouse development life cycle ââ¬Å" 1. Warehouse management 2. Data management 3. Project management a. Only 1, 2 b. Only 1, 3 c. Only 2 ,3 d. All the above 45. What are the components of data warehouse architecture 1. Source Data Component 2. Data Staging Component 3. Data Storage Component a. Only 1, 2 b. Only 1, 3 c. Only 2 ,3 d. All the above 46. There are three staged archival methods, so arrange these methods in to the appropriate sequence. . Recent data is archived to a separate archival database that may still be online. 2. The oldest data is archived to tape cartridges or microfilm and even kept off-site. 3. The older data is archived to flat files on disk storage. a. 1,2,3 b. 2,3,1 c. 3,2,1 d. 1,3,2 47. State whether the following statements are true or false for fact table: 1. Fact Table is m ade up of two or more foreign keys. 2. Fact table always expresses a one-to-many relationship. a. 1-T,2-T b. 1-T,2-F c. 1-F,2-T d. 1-F,2-F 48. The process of turning ________ into _________ is called archiving. a. archived redo log files, redo log files b. Flat files, dump files c. redo log files, archived redo log files d. dump files, Flat files 49. Arrange the functional steps of ETL into an appropriate sequence. 1. Filtering for refreshes and incremental loads 2. Triggering for incremental changes 3. Data extraction 4. Transformation 5. Integration 6. Cleansing 7. Applying to the Data Warehouse database. a. 1,2,3,4,5,6,7 b. 1,3,2,6,5,4,7 c. 2,1,5,4,3,6,7 d. 7,6,5,4,3,2,1 50. _____and ______tools are available to translate the data from one platform to another, and populate the Data Warehouse. a. Statistical Analysis System, Informatics b. Oracle 10g Warehouse builder, MySAP c. Data Extraction, loading d. SAP BI, Oracle 10g 51. State whether the following statements are true or false for CMM levels. 1. At level 3, companies can begin to predict future IT implementation performance. 2. At level 4, IT best practices are documented and performed throughout the enterprise. a. 1-T,2-F b. 1-F,2-T c. 1-T,2-T d. 1-F,2-F 52. State whether the following statements are true or false: 1. ROLAP technology tends to have greater scalability than MOLAP technology 2. MOLAP technology tends to have greater scalability than ROLAP technology a. 1-T,2-F b. -T,2-T c. 1-F,2-T d. 1-F,2-F 53. State whether the following statements are true or false for characteristics of OLAP 1. An OLAP system typically adopts either a star or snowflake model and a subject oriented database design. 2. OLAP systems are not market-oriented. a. 1-T,2-F b. 1-T,2-T c. 1-F,2-T d. 1-F,2-F 54. State True(T) or False(F). 1. RAID 0 provides data stripping 2. RAID 1 prov ides block level stripping a. 1ââ¬âF, 2ââ¬âF b. 1ââ¬âF, 2ââ¬âT c. 1ââ¬âT, 2ââ¬âF d. 1ââ¬âT, 2ââ¬âT 55. Design metadata consists of 1. Schema definition 2. Source tables 3. ETL information a. Only 1 and 2 b. Only 1 and 3 c. Only 2 and 3 d. Only 1 6. The tools of metadata management are 1. Erwin data modeler 2. Ablnitio EME 3. Pentaho Metadata 4. Microsoft repository a. Only 2 and 4 b. Only 1 and 2 c. Only 3 and 4 d. All of the above 57. ________ and _______ensures that data loads and queries perform within expected time frames and that the technical architecture is scalable. a. Performance, Scalability Testing b. Unit, Regression Testing c. Integration, Requirements Testing d. None of the above 58. State whether the following statement is true or false: 1. Regression testing is revalidation of existing functionality with each new release of code. . UAT typically focuses on data loaded to the Data Warehouse and any views that have been created on top of the tables. a. 1-T,2-F b. 1-T,2-T c. 1-F,2-T d. 1-F,2-F 59. State whether the following statements are true or false: 1. Data Mining is user driven approach not data driven approach. 2. Prediction is the other aspect of Data Mining. a. 1-T,2-F b. 1-T,2-T c. 1-F,2-T d. 1-F,2-F 60. Which of the following are the useful informations of Web house: 1. Site statistics 2. Visitor conversions 3. Referring partner links 4. Site navigation resulting in orders 5. Site navigation not resulting in orders a. Only 1, 2, 3 b. .Only 1,2,3,4 c. All 1, 2,3,4,5 d. Only 1,2,3,5 Part C (Four mark questions) 61. Match the following for the functionality of data warehousing. Set A A. Roll-up B. Drill-down C. Pivot D. Slice and Dice E. Selection Set B 1. Data is summarized with increased generalization. 2. Cross tabulation that is, rotation is performed. 3. Increasing levels of detail are revealed. 4. Data is available by value or range. 5. Performing projection operations on the dimensions. a. A-1 , B-2 , C-3 , D-4, E-5 b. A-5 , B-4 , C-3 , D-2, E-1 c. A-1 , B-3 , C-2 , D-5, E-4 d. A-2 , B-1 , C-4 , D-3, E-5 62. State whether the following statements are true or false for Data warehouse 1. Data Warehouse contains data for information purpose. 2. Data Warehouse is a store house of historical data. 3. In Data Warehouse, the requirements are gathered area wise. a. 1-T, 2-T, 3-T b. 1-T, 2-T, 3-T c. 1-F, 2-T, 3-F d. 1-T, 2-T, 3-T 63. Fill in the blank 1. The Data Warehouse functions as a Decision Support System and an 2. The tool will host a meta data repository. 3. A DW architecture is a system that is composed of multiple architectures. . 1- Executive Information System, 2- ETL, 3 Federated b. 1- ETL, 2- Executive Information System, 3 Federated c. 1- Executive Information System, 2-Federated , 3 ETL d. 1- Federated, 2- ETL, 3 Executive Information System 64. What are the characteristics of fact table in star schema? 1. Concatenated key 2. Data grain 3. Fully additive measure 4. Factfull fact table 5. Semi additive measure 6. Table is wide a. 1, 2, 3, 6 only b. 1,2,3,4 only c. 1, 2, 4, 6 only d. 1, 2, 3, 5 only 65. Fill in the blanks. 1. ________ a type of application of data is similar to the initial load. . ________ is the application of ongoing changes from the source systems. 3. ________populating all the Data Warehouse tables for the very first time. a. 1- full refresh, 2- Incremental Load, 3-Initial Load b. 1- Incremental Load, 2-full refresh , 3-Initial Load c. 1- Initial Load, 2- Incremental Load, 3-full refresh d. 1- Incremental Load, 2- Initial Load, 3- full refresh 66. Match the following: 1. Level 0 ââ¬â a. Performed Informally 2. Level 1 ââ¬â b. Not Performed 3. Level 2 ââ¬â c. Well-Defined 4. Level 3 ââ¬â d. Planned and Tracked 5. Level 4 ââ¬â e. Quantitatively Controlled 6. Level 5 ââ¬â f. Continuously Improving a. 1-b,2-a,3-d,4-c,5-e,6-f b. 1-a, 2-b,3-d,4-c,5-e,6-f c. 1-c,2-b,3-a,4-d,5-f,6-e d. 1-f,2-a,3-d,4-c,5-b,6-e 67. Rearrange the following steps in OLAP creation process 1. Transform and standardize data 2. Build cubes 3. Produce reports 4. Extract data 5. Import to OLAP database a. 2, 3, 4, 1, 5 b. 1, 4, 5, 2, 3 c. 4, 1, 5, 2, 3 d. 5, 3, 2, 1, 4 68. Match the following sets Set -1 1. RAID 0 2. RAID 1 3. RAID 0+1 4. RAID 5 Set-2 a. Data Stripping b. Shadowing/Mirroring / Duplexing c. Striping and Mirroring d. block-level striping a. 1-a,2-b,3-c,4-d b. 1-b,2-a,3-c,4-d c. -a,2-b,3-d,4-c d. 1-d,2-c,3-b,4-a 69. Match the following sets Set -1 1. Design Metadata 2. Population Metadata 3. Administrative Metadata Set-2 a. ETL information, sources and interface details b. Schema definition, source tables, and views. c. Access rights, protocols, physical location. a. 1-a,,2-b,3-c b. 1-b,2-a,3-c c. 1-c,2-b,3-a d. 1-b,2-c,3-a 70. Which of the following are not the parts of Unit testing: 1. Whether ETLs are accessing and picking up right data from right source. 2. Sequence of ETLs jobs in batch. 3. Testing the rejected records that donââ¬â¢t fulfill transformation rules. 4. Checking the source system connectivity. 5. Dependency and sequencing. 6. Error log generation. a. 1,2,3 only b. 2,4,5 only c. 2,5,6 only d. 2,3,6 only 71. Arrange the decision support progress of data mining steps in the appropriate sequence. 1. Database systems 2. File based systems 3. OLAP systems 4. Data warehouses 5. Data mining applications a. 1, 2,3,4,5 b. 5, 4,3,2,1 c. 2, 1,4,3,5 d. 3, 2,4,5,1 72. The clickstream data enables analysis of different measures like:ââ¬â 1. Customer demand 2. Demographic data collection 3. Site statistics 4. Feedback on website design 5. Customer buying patterns 6. Effectiveness of marketing promotions a. 1, 2, 3, 4 only b. 1, 2,4,5,6 only c. 1, 2,3,4,5 only d. 4, 5, 6 only 73. State whether the following statements are true or false for features of the data Web house 1. It is a fully distributed system. as Kimball would say, there is no center to the data Web house. 2. It is a Web-enabled system; it is beyond a client/server system. 3. The Web does not support to the data types including textual, numeric, graphical, photographic, audio, video, and more. 4. The Web sleeps for some time. a. 1-F,2-T,3-F,4-F b. 1-T,2-T,3-F,4-F c. 1-F,2-F,3-F,4-T d. 1-F,2-F,3-T,4-T 4. Match the following two sets correctly Setââ¬âI a. MineSet b. Clementine c. DMMiner d. Intelligent Miner Setââ¬âII 1. DBMiner technology inc. 2. SPSS Inc. integral solutions 3. IBM Corp 4. Silicon Graphics Incââ¬âSGI a. aââ¬â4, bââ¬â3, cââ¬â2, dââ¬â1 b. aââ¬â4, bââ¬â2, cââ¬â1, dââ¬â3 c. aââ¬â2, bââ¬â3, cââ¬â4, dââ¬â1 d. aâ⠬â4, bââ¬â2, cââ¬â3, dââ¬â1 75. Match the following two sets correctly Setââ¬âI a. Disk mirroring b. Disk striping c. Parity checking d. Disk duplexing Setââ¬âII 1. Writing the same data to two disk drives connected to the same controller 2. Each disk has its own distinct controller 3. Ensures correct transmission of data 4. Data spread across multiple disks by sectors a. aââ¬â3, bââ¬â1, cââ¬â2, dââ¬â4 b. aââ¬â1, bââ¬â2, cââ¬â3, dââ¬â4 c. aââ¬â1, bââ¬â4, cââ¬â3, dââ¬â2 d. aââ¬â2, bââ¬â4, cââ¬â3, dââ¬â1 Answer Keys Part A Q. No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Ans. Key B A B D D B C C B A C B D C B B C A C D Q. No. 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Ans. Key C A D C D A A C C B D B A D B C D A C C Q. No. 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 Part B Ans. Key D B C A D D B C C C D A A C A D A B C C Q. No. 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 Part C Ans. Key C C A D A A C A B C C B B B C
Monday, October 21, 2019
Free Essays on Hitlers Rise To Power
in 1920, soon after becoming leader of the newly named National Socialist German Workersââ¬â¢ Party, commonly known as the Nazi Party. There are many contributing factors, which lead to Hitlerââ¬â¢s gain in power over the next thirteen years. The recent history of post-war Germany, and the events that would follow were of perfect conditions for the rise of an extremist party such as the Nazis. World War One had left Germany in defeat. Germany was put under immense pressure by the treaty of Versailles, which contributed to the disastrous and politically unstable early twenties. Hitler was a strong and manipulating character, with extraordinary leadership skills and his party was very tactical. He was very much underestimated by opposing political parties. All of these factors lead to Hitler and his Nazisââ¬â¢ becoming the sole political party in the Reichstag in 1933. The German Empire was formed in 1871 and soon became one of Europeââ¬â¢s most influential countries. It dominated in industrial and military power, and the German people were proud of their achievements. Up until the end of World War One, a Kaiser ruled Germany. From 1888 the Kaiser was Wilhelm II. He was very ambitious and militaristic and a threat to other countries. The German people were very accustomed to success, and when Germany was defeated in World War One, they were shocked and angry. The Weimar Constitution was drawn up to help Germany bounce back. This constitution was genuinely democratic but had some weaknesses. A president ruled with a chancellor and pr... Free Essays on Hitler's Rise To Power Free Essays on Hitler's Rise To Power Hitlerââ¬â¢s Rise To Power Who or what was responsible for Hitlerââ¬â¢s rise to power? Many believe that there was only one factor for his rise to power. Some state that Hitler could not have risen to power in any other than Germany, implying that he was nothing more than a product of German culture. Others say that Hitler made himself dictator by means of his political genius. And yet still others claim that it was the weak democratic government of the Weimar Republic or Germanyââ¬â¢s social and economic scene in the 1930ââ¬â¢s that made the people restless and ready for a dictator to come to power. There was no sole cause for Hitlerââ¬â¢s rise to power. There were two. The political and economic chaos of the 1920ââ¬â¢s and the 1930ââ¬â¢s joined forces with German culture that enabled Hitler to rise to power. Both play an equal part. Together, both reasons fit together like pieces of a puzzle, to create a unique situation for Hitlerââ¬â¢s rise. Hitler was in part a product of German culture. German culture stands out as particularly aggressive and racist. The values and ideas found in this cultureââ¬â¢s history inspired Hitler to do many things that he did and can explain in part why he felt the way he did on certain issues (Stern). Stevens 2 Hundreds of years before Hitler emerged, German philosophers and artist preached an almost religious worship of the state. They discussed the idea of the master race, and created a mythology of German heroism that encouraged loyalty to the group and glorified death for the country. Hitler and many Germans like him, was an enthusiastic student of Georg Wilhelm Friedrich Hegel who argued that the State ââ¬Å"has the supreme right against the individual, whose supreme duty is to be a member of the State.â⬠Hegel foresaw in the early 1800ââ¬â¢s that ââ¬Å"Germanyââ¬â¢s hourâ⬠would come and that the countryââ¬â¢s mission would be to redevelop the world. A German hero would compl ete this mission (Landry). Like Hegel, another Germ... Free Essays on Hitler's Rise To Power Hitlerââ¬â¢s Rise to Power ââ¬Å"Instead of working to achieve power by armed coup, we shall hold our noses and enter the Reichstag against the opposition deputies. If outvoting them takes longer than out shooting them, at least the results will be guaranteed by their own constitution. Sooner or later we shall have a majority, and after that- Germany. (Heiden, 142)â⬠Adolf Hitler spoke these words in 1920, soon after becoming leader of the newly named National Socialist German Workersââ¬â¢ Party, commonly known as the Nazi Party. There are many contributing factors, which lead to Hitlerââ¬â¢s gain in power over the next thirteen years. The recent history of post-war Germany, and the events that would follow were of perfect conditions for the rise of an extremist party such as the Nazis. World War One had left Germany in defeat. Germany was put under immense pressure by the treaty of Versailles, which contributed to the disastrous and politically unstable early twenties. Hitler was a strong and manipulating character, with extraordinary leadership skills and his party was very tactical. He was very much underestimated by opposing political parties. All of these factors lead to Hitler and his Nazisââ¬â¢ becoming the sole political party in the Reichstag in 1933. The German Empire was formed in 1871 and soon became one of Europeââ¬â¢s most influential countries. It dominated in industrial and military power, and the German people were proud of their achievements. Up until the end of World War One, a Kaiser ruled Germany. From 1888 the Kaiser was Wilhelm II. He was very ambitious and militaristic and a threat to other countries. The German people were very accustomed to success, and when Germany was defeated in World War One, they were shocked and angry. The Weimar Constitution was drawn up to help Germany bounce back. This constitution was genuinely democratic but had some weaknesses. A president ruled with a chancellor and pr...
Saturday, October 19, 2019
Bidirectional Visitor Counter
Visitor counting is simply a measurement of the visitor traffic entering and exiting offices, malls, sports venues, etc. Counting the visitors helps to maximize the efficiency and effectiveness of employees, floor area and sales potential of an organization . Visitor counting is not limited to the entry/exit point of a company but has a wide range of applications that provide information to management on the volume and flow of people throughout a location. A primary method for counting the visitors involves hiring human auditors to stand and manually tally the number of visitors who pass by a certain location. But human-based data collection comes at great expense. Here is a low-cost microcontroller based visitor counter that can be used to know the number of persons at a place. All the components required are readily available in the market and the circuit is easy to build . Two IR transmitter-receiver pairs are used at the passage: one pair comprising IR transmitter IR TX1 and receiver phototransistor T1 is installed at the entry point of the passage, while the other pair comprising IR transmitter IR TX2 and phototransistor(TSOP sensor) T2 is installed at the exit of the passage. The IR signals from the IR LEDs should continuously fall on the respective phototransistors, so proper orientation of the transmitters and phototransistors is necessary. Two similar sections detect interruption of the IR beam and generate clock pulse for the microcontroller. The microcontroller controls counting and displays the number of persons present inside the hall is also displayed on the seven segment displays. It receives the signals from the sensors, and this signal is operated under the control of software which is stored in ROM. Microcontroller AT89S52 continuously monitor the Infrared Receivers, When any object pass through the IR Receivers then the IR Rays falling on the receiver are obstructed , this obstruction is sensed by the Microcontroller. Block Diagram The basic block diagram of the bidirectional visitor counter with automatic light controller is shown in the above figure. Mainly this Block diagram consist of the following essential blocks. 1. Power Supply 2. Entry and Exit sensor circuit 3. AT 89c2052 micro-controller 1. Power Supply:- Here we used +12V and +5V dc power supply. The main function of this block is to provide the required amount of voltage to essential circuits. +12 voltage is given. +12V is given to relay driver. To get the +5V dc power supply we have used here IC 7805, which provides the +5V dc regulated power supply. 2. Enter and Exit Circuits:- This is one of the main part of our project. The main intention of this block is to sense the person. For sensing the person and light we are using the light dependent register (LDR). By using this sensor and its related circuit diagram we can count the persons. 3. AT89C2051 Microcontroller IC AT89C205(IC2) is at the heart of the circuit. It is a 20-pin, 8-bit microcontroller with 2 kb of Flash programmable and erasable read-only memory (PEROM), 128 bytes of RAM, 15 input/output (I/O) lines, two 16-bit timer/counters, a five-vector two-level interrupt architecture, a full duplex serial port, a precision analogue comparator, on-chip oscillator and clock circuitry. CIRCUIT DESCRIPTION: There are two main parts of the circuits. 1. Transmission Circuits (Infrared LEDs) 2. Receiver Circuit (Sensors) 1. Transmission circuit In this circuit, a negative pulse applied at pin 2 triggers an internal flip-flop that turns off pin 7s discharge transistor, allowing C1 to charge up through R1. At the same time, the flip-flop brings the output (pin 3) level to high. When capacitor C1 as charged up to about 2/3 Vcc, the flip-flop is triggered once again, this time making the pin 3 output low and turning on pin 7s discharge transistor, which discharges C1 to ground. This circuit, in effect, produces a pulse at pin 3 whose width t is just the product of R1 and C1, i. e. , t=R1C1. IR transmission circuit is used to generate the modulated 36 kHz IR signal. The IC555 in the transmitter side is to generate 36 kHz square wave. Adjust the preset in the transmitter to get a 38 kHz signal at the o/p. around 1. 4K we get a 38 kHz signal. Then you point it over the sensor and its o/p will go low when it senses the IR signal of 38 kHz. This circuit diagram shows how a 555 timer IC is configured to function as a basic monostable multivibrator . A monostable multivibrator is a timing circuit that changes state once triggered, but returns to its original state after a certain time delay. It got its name from the fact that only one of its output states is stable. It is also known as a one-shot. 2. Receiver circuit The IR transmitter will emit modulated 38 kHz IR signal and at the receiver we use TSOP1738 (Infrared Sensor). The output goes high when the there is an interruption and it return back to low after the time period determined by the capacitor and resistor in the circuit. I. e. around 1 second. CL100 is to trigger the IC555 which is configured as monostable multivibrator. So when anybody crosses the transmitter receive pair the output from TSOP sensor will high and microcontroller will know that the interruption and decide whether increment the count decrement from the loaded program. After receiving signal from sensor microcontroller will define whether it was enter or exit by using following algorithm.. 1 . If the sensor 1 is interrupted first then the microcontroller will look for the sensor 2. And if it is interrupted then the microcontroller will increment the count . 2. If the sensor 2 is interrupted first then the microcontroller will look for the sensor 1. And if it is interrupted then the microcontroller will decrement the count. Advantage o Low cost o Easy to use o Implement in single door Disadvantage It is used only when one single person cuts the rays of the sensor hence it cannot be used when two person cross simultaneouslyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. CODE : If you need the code of this project please join this site as member . After joining as member post your request in comments .. Dont write your mail id . Remember the coding of this project will be strictly given to the members of this site only
Friday, October 18, 2019
Journal assignment Essay Example | Topics and Well Written Essays - 1750 words
Journal assignment - Essay Example in a sign of a heartless effort to punish her because she left her previous employer who happened to be a member of British Parliament, MP and also minister Mark Harper, There are many stories like hers as Britain is a magnet of illegal immigrants because the cities of the country are largely cosmpolitan and their presence is hardly noted among a multitude of various nationalities. It may be a case of implementing strict immigration laws no matter who is the culprit but at times there should be some kind of consideration. As what happened, Isabella was forcibly put on a plane and deported back to Colombia. She is now all alone in Medellin, Colombia with no relative to help he out and no prospects of another good job too. Compassion and kindness could have saved her but the immigration authorities had to draw a line somewhere otherwise the United Kingdom will be full of illegal or undocumented immigrants. August 09, 2014. The Economist: ââ¬Å"Women in politics: treating the fair sex fairly.â⬠by writing staff. . This article discussed how women in politics had fared in five countries, namely: Argentina, Chile, Colombia, Costa Rica, and the United States of America. It seems the research study by the authors cited in this article are of the opinion that female ministers in top government posts were appointed in a fair manner unlike the popular perception that female politicians and ministers had been usually appointed to their posts as mere tokinism. This is certainly not the case in Colombia so the country has a good record of equality among both genders. Women in politics were measured by number of bills they had passed or the legislation they had sponsored, how long they had stayed in office and other criteria such as how easy they got replaced by male apppointees. This is a welcome
World hunger Essay Example | Topics and Well Written Essays - 750 words
World hunger - Essay Example In most cases, these conflicts at the end of the day would benefit only a few powerful groups of people who belong to the ruling elite in conflict ridden nations. The majority of people suffer in silence since there is no way they can force their governments to stop funding conflicts instead of buying food. Basically, it was estimated that about 805 million people of the 7.3 billion world population suffered from chronic undernourishment in 2012-2014 and the majority of these people belong to developing countries (FAO, 2012). Apparently, the Center for Research on the Epidemiology of Disasters (CRED, 2013) estimates that conflicts worldwide affected more than 172 million people leading to hunger. According to the statistics presented by CRED, ââ¬Å"Pakistan with 28 million and Nigeria with nearly 19 million had the largest numbers of people affected by conflict.â⬠On the other hand, Libya and Somalia had the highest proportion of people affected by violence which has also led to serious hunger. The other striking thing about the statistics presented above is that the above mentioned countries are solidly behind sponsoring the conflicts in their countries. For instance, the government in Somalia spends a huge chunk of its budget on procuring weapons of war and is constantly engage d in bitter endless conflicts. The majority of people in these countries are hunger stricken and they are undernourished. What is even surprising is that the governments involved in conflicts spend large sums of money buying weapons while the citizens are dying. It appeals to logic that those responsible authorities funding conflicts should prioritize humanitarian needs such as procuring food. In most cases, such conflicts only benefit a few people and they are sponsored using the national budget. Only a few people who are well connected to the ruling elite will immensely benefit from such conflicts often witnessed
The Four Stages of Life as a Hindu Research Paper
The Four Stages of Life as a Hindu - Research Paper Example Overall, the first three stages aim for an appreciation of life, while the fourth one is centered upon the rejection of life and the attainment of wisdom. During the first three stages of Hindu life, one is expected to observe the ââ¬Å"dharmaâ⬠or the laws of morality and the ââ¬Å"sistacaraâ⬠or the ideal social culture (Jhingran 77). Only Hindu males, however, are expected to undergo the four stages (76). Overall, the first three stages only include men and not women. Nevertheless, wives may participate with their husbandsââ¬â¢ role beginning with the second stage. (ââ¬Å"The Four Stagesâ⬠) The first stage is the student stage, or Brahmacharya, where a Hindu male is expected to live and study with a guru or teacher for several years (ââ¬Å"The Four Stagesâ⬠). Normally, a high caste Hindu male undergoes the student stage from the age of 8 to 12 years old up to about 18 to 24 years old (ââ¬Å"Hinduismâ⬠). This is the stage where the student serves th e guru and shows respect to his teacher, as well as develop the habits, skills and practical knowledge he needs for the succeeding stages (ââ¬Å"Hinduismâ⬠). Moreover, it is during this stage that the student begins studying the Vedas, or the sacred Hindu texts. (ââ¬Å"The Four Stagesâ⬠) It is actually only the Brahmins who are supposed to study and memorize huge portions of the Vedas as well as the accompanying texts, while at the same time undergoing training in the various Hindu rituals. Moreover, these Brahmins, as well as all other members of the other castes, learn the procedure for setting up and maintaining their own household worship, which are centered on the holy fire of Agni, the Hindu god of fire and receiver of sacrifices. (ââ¬Å"The Four Stagesâ⬠) It is interesting to note that the study of the Vedas applies only to those who belong to the ââ¬Å"twice-bornâ⬠castes, or the upper three castes ââ¬â the Brahmins, the Kshatriyas and the Vaishya s ââ¬â or only those to whom the religion applied in the Vedas applies. The Shudras, or the servants of upper castes and peasants, are therefore excluded from the study of the Vedas (ââ¬Å"Social Organizationâ⬠). On the other hand, members of the twice-born castes, before they become a student, undergo a certain ceremony called the thread ceremony, where the initiate wears a red thread over his left shoulder. This is symbolic of the formal and official entrance of a young boy into Hinduism. The thread ceremony is a kind of samskara or ritual not only ordains a young boy into Hinduism but also confers in him the quality of being reborn and permits him to hear the sacred Vedas for the first time and learn his first mantra. (ââ¬Å"The Four Stagesâ⬠) The student at this stage is also expected to remain celibate (Sharma 28). The means of which is to preserve the semen, which is the ââ¬Å"vital fluid of life,â⬠and the purpose of preserving this vital fluid is to hav e ââ¬Å"glowing faces, reddish or pinkish countenance, strong muscles and bones, [and] proportionally built healthy bodiesâ⬠(29-30). Overall the ultimate purpose of the student stage is the development of three aspects of a young personââ¬â¢s self and personality: body, mind and intellect. (30) Lastly, the student is expected to avoid any form of luxury or pleasures, and to practice forgiveness, perseverance and self-control. He is also expected to develop control of emotions like anger and jealousy. (Jhingran 78) After the
Thursday, October 17, 2019
Brands Assignment Example | Topics and Well Written Essays - 250 words - 1
Brands - Assignment Example However, the products manufactured by the company are extremely costly. In most developed countries, the unique nature of the Apple products is highly appreciated. Therefore, as a purchasing officer for a business, I would buy Apple computers for the company. I would also pay the same price for their products due to various reasons. For instance, Apple products are ultimately unique (Lashinsky, 2012). The company is also considered quite successful by most individuals. Research also asserts that, Apple has taken part in most environmental issues that are affecting the world. This is a clear portrayal that the products produced by Apple are environmentally-friendly. The company has also worked with several manufacturers in order to comprise the splendid working conditions. This affirms that the employees at the Apple industry are highly recognized. In conclusion, various sources conclude that the ceremonies usually draw a huge multitude of individuals (Lashinsky, 2012). Furthermore, the Apple consumers have been highly recognized as individuals who are better educated and affluent than most of the PC company consumers. Apple also has a wide range of products. Therefore, as a purchasing officer, I would ensure that all employees in the firm are equipped with the latest technology from Apple
Subscribe to:
Posts (Atom)